You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: docs/limitations.md
+23-9Lines changed: 23 additions & 9 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -8,17 +8,31 @@ featureMaturity:
8
8
9
9
---
10
10
11
-
* Mesosphere does not provide support for Spark app development, such as writing a Python app to process data from Kafka or writing Scala code to process data from HDFS.
11
+
* Mesosphere does not provide support for Spark app development, such as writing a Python app to process data from
12
+
Kafka or writing Scala code to process data from HDFS.
12
13
13
-
* Spark jobs run in Docker containers. The first time you run a Spark job on a node, it might take longer than you expect because of the `docker pull`.
14
+
* Spark jobs run in Docker containers. The first time you run a Spark job on a node, it might take longer than you
15
+
expect because of the `docker pull`.
14
16
15
-
* DC/OS Apache Spark only supports running the Spark shell from within a DC/OS cluster. See the Spark Shell section for more information. For interactive analytics, we recommend Zeppelin, which supports visualizations and dynamic dependency management.
17
+
* DC/OS Apache Spark only supports running the Spark shell from within a DC/OS cluster. See the Spark Shell section
18
+
for more information. For interactive analytics, we recommend Zeppelin, which supports visualizations and dynamic
19
+
dependency management.
16
20
17
-
* With Spark SSL/TLS enabled,
18
-
if you specify environment-based secrets with `spark.mesos.[driver|executor].secret.envkeys`,
19
-
the keystore and truststore secrets will also show up as environment-based secrets,
20
-
due to the way secrets are implemented. You can ignore these extra environment variables.
21
+
* With Spark SSL/TLS enabled, if you specify environment-based secrets with
22
+
`spark.mesos.[driver|executor].secret.envkeys, the keystore and truststore secrets will also show up as
23
+
environment-based secrets, due to the way secrets are implemented. You can ignore these extra environment variables.
21
24
22
-
* When using Kerberos and HDFS, the Spark Driver generates delegation tokens and distributes them to it's Executors via RPC. Authentication of the Executors with the Driver is done with a [shared secret][https://spark.apache.org/docs/latest/security.html#spark-security]. Without authentication, it is possible for executor containers to register with the Driver and retrieve the delegation tokens. Currently, for Spark on Mesos this requires manually setting up the default configuration in Spark to use authentication and setting the secret. Mesosphere is actively working to make this an automated and secure process in future releases.
25
+
* When using Kerberos and HDFS, the Spark Driver generates delegation tokens and distributes them to it's Executors
26
+
via RPC. Authentication of the Executors with the Driver is done with a [shared
27
+
secret][https://spark.apache.org/docs/latest/security.html#spark-security]. Without authentication, it is possible
28
+
for executor containers to register with the Driver and retrieve the delegation tokens. To secure delegation token
29
+
distribution, use the `--executor-auth-secret` option.
23
30
24
-
* Spark runs all of its components in Docker containers. Since the Docker image contains a full Linux userspace with its own `/etc/users` file, it is possible for the default service user `nobody` to have a different UID inside the container than on the host system. Although user `nobody` has UID 65534 by convention on many systems, this is not always the case. As Mesos does not perform UID mapping between Linux user namespaces, specifying a service user of `nobody` in this case will cause access failures when the container user attempts to open or execute a filesystem resource owned by a user with a different UID, preventing the service from launching. If the hosts in your cluster have a UID for `nobody` other than 65534, you will need to specify a service user of root to run DC/OS Spark successfully.
31
+
* Spark runs all of its components in Docker containers. Since the Docker image contains a full Linux userspace with
32
+
its own `/etc/users` file, it is possible for the user `nobody` to have a different UID inside the
33
+
container than on the host system. Although user `nobody` has UID 65534 by convention on many systems, this is not
34
+
always the case. As Mesos does not perform UID mapping between Linux user namespaces, specifying a service user of
35
+
`nobody` in this case will cause access failures when the container user attempts to open or execute a filesystem
36
+
resource owned by a user with a different UID, preventing the service from launching. If the hosts in your cluster
37
+
have a UID for `nobody` other than 65534, you will need to maintain the default use (`root`) to run DC/OS Spark
0 commit comments